Section A - Standards that Apply to All RFPs

Size: px
Start display at page:

Download "Section A - Standards that Apply to All RFPs"

Transcription

1 These standards provide general information regarding the services provided by the Information Technology branch, in the context of implementation projects. These standards are published, at minimum, bi-annually through consultation with subject matter experts. Respondents who have questions regarding these standards should engage the contact identified on the RFP they are responding to. Section A - Standards that Apply to All RFPs These standards apply, regardless of where the Solution may be hosted. 1. Project Management Methodology Project Lifecycle / Gating Process The Information Technology Branch uses a customized project management methodology which aligns with PMI standards. The Information Technology Branch utilizes the standard PMBOK Process Groups for the formal deliverables. These groups are: Initiating, Planning, Executing, Monitor & Controlling, and Closing. Mandatory deliverables are defined via a published Responsibility Matrix.. Implementation of any information technology to City of Edmonton staff normally must utilize this methodology for the IT-specific components of the Project, even if the primary purpose of your Project is not Information Technology. For all implementations, weekly status reports and monthly project logs must be submitted to the PMO utilizing in-house standard templates. Disaster Recovery Planning FOIP All projects must include a Disaster Recovery plan specific to the requirements of the business. This applies whether the solution is to be hosted by the City of Edmonton or by a third-party. All projects must include a Pre-PIE (Preliminary Privacy Impact Evaluation) and potentially a PIE (Privacy Impact Evaluation) which is approved by the Corporate FOIP office in the Office of the City Clerk. 2. Security & Risk Assurance General Solutions must use industry-standard (or better) security procedures and technologies. The level of security controls must be adequate given the risks and information managed by the application, and must be compatible with existing City of Edmonton security infrastructure. Installation, support, development and enhancements of solutions should be performed on-site. If this is not possible, then remote access will be provided by the City of Edmonton using one of our existing remote access solutions. Infrastructure All City-managed computers (server, desktop, laptop) require a Last Update: March 2, 2017 Page 1 of 9

2 working, properly configured anti-virus software that meets the City s standard anti-virus offerings. Solutions deployed to personal computing devices should not require Local Administrator to operate. Local connections to the City of Edmonton network must be done with City-managed devices. Direct connection of devices not managed by the Information Technology Branch to the City of Edmonton internal corporate network is not permitted. Remote access to the City of Edmonton network is limited to use of City of Edmonton approved and managed access solutions. Use of remote access includes granting the City of Edmonton permission to validate the security of the device being used to connect, including (but not limited to) anti-virus and operating system patch levels. Access is sometimes limited to City-managed devices, based on the access level that is necessary. Access sometimes requires the use of two-factor authentication. Internal Solutions The use of non-standard ports will require explicit City of Edmonton approval, including the use of compensatory packages to strengthen the level of security. Information stored locally on mobile computing devices must be protected by an appropriate data security solution, as determined by the City of Edmonton. Encryption of stored data requires City of Edmonton approval and must include key escrow procedures to ensure encryption keys are available when staff are absent. External Solutions Any secure internet site which the City of Edmonton is required to use as part of a solution must be signed with a valid and trusted SSL certificate. Self-signed SSL certificates are not accepted by the City of Edmonton as either valid or trusted. Any communication over a publicly accessible network that involves the transmission of City of Edmonton information must be adequately encrypted. Adequacy is subject to City of Edmonton approval. 3. Enterprise Solutions ERP Applications PeopleSoft HR POSSE SAP SAP Business Objects Spatial Land Inventory Management (SLIM) System Spatial Data & Rendering GeoMedia suite Oracle RDBMS with Oracle Spatial and Oracle Workspace Manager Drafting Bentley Microstation Last Update: March 2, 2017 Page 2 of 9

3 Bentley Maps 4. Desktop Software The applications detailed here are available on all standard desktop installations at the City of Edmonton. Standard operating system for desktops is Microsoft Windows bit. Productivity Software G Suite (Standard Mail and Calendar) G Suite (collaboration and productivity) Google Hangout Adobe Reader Adobe Flash Player Adobe Shockwave RightFax Note: Additional Microsoft Office Professional 2010 applications are available as complimentary productivity tools providing the appropriate business requirements Web Browsers Google Chrome Internet Explorer Ver 11 (exceptions available for alternative IE Versions) Anti-Virus Anti-Virus services are provided to all desktop and laptop installations. Software Fax Software-based FAX service is available on all desktop installations. 5. & Calendar & Calendar Video Streaming Google and Google Calendar are the primary and calendar service offerings. Exchange services are available for application integration use. Archival services are provided to all services. Filtering of , for spam and security purposes, is actively performed. Video streaming is provided through internally hosted streaming services and through web-hosted streaming services. The standard for streamed video format is H.264 MPEG Development Tools These standards only apply to solutions that the City of Edmonton will be directly supporting in a fashion that requires changes to implementation code. Application.NET C++ Java Last Update: March 2, 2017 Page 3 of 9

4 PERL Database Business Objects Enterprise XI Oracle Discoverer Oracle Enterprise Manager Oracle Forms Oracle JDeveloper Oracle Reports SQL Navigator SQL Plus SQL Developer TOAD Version Control Team Foundation Server/Team Foundation Services Web Development.NET Technology SAP NetWeaver Developer Studio 7. Open Source The following standards only apply to Open-Source respondents to RFPs. Product Roadmap The City of Edmonton encourages vendors to submit roadmaps for open source products as part of an RFP response to ensure we have an understanding of how the product s features will be changing over the near future. Product Support RFP responses that are suggesting the use of an open source product must contain elements that detail how adequate support for this product will be provided. Adequacy is determined by the City of Edmonton. 8. Web Application The following standards only apply to web applications or websites. Mobile Friendly Avoids software that is not common on mobile devices, like Flash Uses text that is readable without zooming Sizes content to the screen so users don't have to scroll horizontally or zoom Places links far enough apart so that the correct one can be easily tapped Encryption Protects web application with HTTPS, even if it doesn t handle sensitive communications 9. Public Facing Web Application The following standards only apply to web applications or websites that are public facing. Last Update: March 2, 2017 Page 4 of 9

5 Visual Identity, Colors and Fonts Must be able to follow the CoE Visual Identity Standards. Google Analytics Must be able to embed the Google Analytics to track the visiting traffic details. Section B - Standards that Apply to City Hosted Solutions These standards apply where the services or servers are to be located at a City of Edmonton datacenter. 1. Computing Facilities General Rack Sizes The City of Edmonton maintains three primary computing facilities. All solutions that are hosted by the City should be capable of being hosted from one of these three facilities and must conform to IEEE standards. All equipment that is to be hosted at a City of Edmonton computing facility must use a standard 19-inch rack size. 2. Networks Internal Network Internal wired network connections exist at all city facilities. Any product, device, or application requiring network access, or sending/receiving data across the city s network that does not meet CoE Server, operating system, hardware or software standards requires prior approval on a case by case basis. Remote Access Vendor remote access is offered by the City of Edmonton, if required. 3. Data Storage & Backup Data Storage The City of Edmonton maintains a fibre-channel data storage-area network, that is available to all solutions hosted at the City of Edmonton computing facilities. Mirroring between systems is available, if required, to enable higher availability of systems. Backups All corporate information is subject to regular backups. Backups also include off-site storage as part of the City of Edmonton s Disaster Recovery plans. 4. Telecommunications Last Update: March 2, 2017 Page 5 of 9

6 General Telecommunications services to the city s 400+ sites are provided through a combination of Centrex digital, analog telephone services and Voice over IP services. Any telecommunications device or application must utilize existing telecommunications infrastructure. The use of analog telephone services requires approval by the City of Edmonton. Voic Voic is provided by a combination of City owned systems devices and service contracts with providers. 5. Server Operating Systems There are two supported operating systems. Both operating systems are available to each class of server (see below). Windows Server 2012 R2 UNIX Specific Versioning is available upon request if appropriate Database Servers The UNIX operating system is the preferred environment for solutions that require high-availability. Virtualization The City of Edmonton uses virtualization technology within its server infrastructure. The use of virtual servers is strongly preferred for all Windows solutions. Higher requirements should utilize standalone physical server(s) with preference to blades, then rack mounted.. *1-4 vcpu to max of 12 vcpu 8-16 gigs RAM to a max of 64 gigs RAM 1 v NIC Network connection 100 GB of storage disk - includes 40 gb required for C: OS (extra charge required for more disk) Licensing Remote Access Antivirus Domain Environment Software licensing models must indicate what premium, if any, is charged for multicore processor configurations. The license models must also indicate how virtual environments impacts the costs and terms of the license. No remote access solutions may be installed directly on servers. Only the existing remote access solutions maintained, and approved, by the Information Technology Branch Network Operations Team may be used. All server installations include anti-virus services. The current version of Domain Controllers for Active Directory is Windows Server 2012 R2. Last Update: March 2, 2017 Page 6 of 9

7 Windows AD Test Environment A test domain is available which closely simulates the production environment. 6. Database Enterprise Environments The City of Edmonton supports two enterprise class database environments: Oracle - 12c. Microsoft SQL Server The use of other enterprise level database environments must be justified on an exception basis. Database Development The City of Edmonton provides limited development support for local and middle tier database applications. Technical support at this level is limited to the provisioning of the database platforms and does not extend to the support of end-user applications developed using these database solutions. Limited "best-effort" application support may be available in certain circumstances. Database Architecture The City of Edmonton supports the the sound Database Architecture principles, including the normalization of logical data to physical database Data Lifecycle The City of Edmonton requires the ability to manage application lifespan with archive and purge options. 7. Desktop Computing Devices Operating Systems There are two supported standard operating systems. Not all operating systems are available on all classes of devices. Windows bit Chrome OS Alternative platforms may be available as exceptions. Desktop Desktop computers run either supported operating system, as appropriate to their hardware. Last Update: March 2, 2017 Page 7 of 9

8 Laptops Laptop computers run either supported operating system, as appropriate to their hardware. Tablets Tablet computing devices are primarily ipad devices. 1. Internal Authentication General Active Directory is the authoritative source for all authentications within the City of Edmonton network, including employees and external affiliates. Single Sign-On It is desired that Internally hosted solutions have the capability to integrate with authentication services. Integration It is desired that internally hosted solutions be capable of integrating with Active Directory for the purpose of account provisioning and deprovisioning. On-demand integration with Active Directory, such as for authentication, should not be performed except through a City of Edmonton approved authentication source. Section C - Standards that Apply to Externally Hosted Solutions These standards apply where the services or servers are to be located at a location managed by a service provider. 1. External Authentication General All external solutions must provide application security, including role-based access control. Account IDs and passwords must be capable of being at minimum 10 character each. Single Sign-On It is desired that externally hosted solutions have the capability to integrate with authentication services. They should rely on existing standard authentication processes, such as SAML or OAUTH. Integration It is desired that externally hosted solutions be capable of integrating with Active Directory for the purpose of account provisioning and deprovisioning. On-demand integration with Active Directory, such as for authentication, should not be performed except through a City of Edmonton approved authentication source. 2. Business Continuity Last Update: March 2, 2017 Page 8 of 9

9 Disaster Recovery Plans All City of Edmonton solutions are required, as part of the Business Impact Assessment, to define Recovery Point Objectives and Recovery Time Objectives. Backups All data backups must be encrypted. All data backups must be either stored offsite or replicated to an alternate site. 3. Application Design & Configuration Design All applications must include an Entity Relationship Diagram. Configuration The application should allow customization and / or configuration to maintain City of Edmonton communications design guidelines regarding the visual look and feel of the application. The proponent of the application should describe how the application could be moved to a different platform or functionality transitioned to another application. 4. Integration Web Services The preferred method for accessing City data is web-services that use industry-standard protocols and message formats. The functionality of the application should be consumable via web services to enable as real-time integration, or as near to real-time as is reasonable. Data The City s data must be available to other City of Edmonton applications including business intelligence and statistical reporting tools. Unstructured data should reside in a content repository versus the application s database. Last Update: March 2, 2017 Page 9 of 9

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Section A - Standards that Apply to All CoE Owned Devices

Section A - Standards that Apply to All CoE Owned Devices These standards provide general information regarding the devices provided and supported by the Information Technology branch. These standards are published, at minimum, bi-annually through consultation

More information

Blueprinting Questionnaire Sample

Blueprinting Questionnaire Sample Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter

More information

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS

MYOB ENTERPRISE SOLUTIONS. System Requirement Guidelines EXO BUSINESS. Version 2.9 Thursday 1 st May 2014 MYOB ENT ER P R IS E S OLUT IONS MYOB ENTERPRISE SOLUTIONS System Requirement Guidelines Version 2.9 Thursday 1 st May 2014 EXO BUSINESS MYOB ENT ER P R IS E S OLUT IONS Contents Important Please Read Carefully... 3 Quick Links... 3 System

More information

REQUEST FOR INFORMATION. Records Management. in SharePoint

REQUEST FOR INFORMATION. Records Management. in SharePoint REQUEST FOR INFORMATION For Washington County, Minnesota Records Management in SharePoint February 22, 2018 TABLE OF CONTENTS INTRODUCTION & BACKGROUND... 3 1. Introduction... 3 2. County Information...

More information

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Table of Contents. Page 1 of 6 (Last updated 27 April 2017) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

Academic Price Sheet Respondent:

Academic Price Sheet Respondent: Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either Government, or both. Any software listed for which there is not a corresponding

More information

Code Alert Customer Information Technology Requirements Series 30 Software

Code Alert Customer Information Technology Requirements Series 30 Software Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

FY18 ITS Service Rates

FY18 ITS Service Rates Updated by Richard Hu Updated on 4/25/17 FY18 ITS Service Rates Desktops, Laptops, Mobile & Other Devices Standard Devices FY18 Rate New Connection, Replacement, Reconnect, FY17 Rate Relocation Standard

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

MYOB Enterprise Solutions

MYOB Enterprise Solutions Enterprise Solutions System Requirement Guidelines Last Updated: 16 May 2017 Contents Important Please Read Carefully 4 Quick Links 4 System Requirements 5 Overview... 5 Server Requirements... 6 Server

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo. Diageo Third Party Hosting Standard 1. Purpose This document is for technical staff involved in the provision of externally hosted solutions for Diageo. This document defines the requirements that third

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

Services Catalouge.

Services Catalouge. Services Catalouge www.interactts.com Consulting & Professional Services Consulting & Professional Services Active Directory Implementation & Migration Microsoft Exchange Server Data Center Assessments

More information

QUESTIONS AND CONTACTS

QUESTIONS AND CONTACTS Contact: Jake Losinski, Management Analyst P.O. Box 2315 480 East Avenue North Ketchum, ID 83340 July 27, 2018 Telephone: (208) 727-5081 jlosinski@ketchumidaho.org SUBMITTAL DEADLINE The City of Ketchum,

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

MB Microsoft Dynamics CRM 2016 Online Deployment.

MB Microsoft Dynamics CRM 2016 Online Deployment. MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly

More information

Data Security and Privacy Principles IBM Cloud Services

Data Security and Privacy Principles IBM Cloud Services Data Security and Privacy Principles IBM Cloud Services 2 Data Security and Privacy Principles: IBM Cloud Services Contents 2 Overview 2 Governance 3 Security Policies 3 Access, Intervention, Transfer

More information

VMware View Upgrade Guide

VMware View Upgrade Guide View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for

More information

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC

More information

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client

More information

SYSTEM REQUIREMENTS M.APP ENTERPRISE

SYSTEM REQUIREMENTS M.APP ENTERPRISE SYSTEM REQUIREMENTS M.APP ENTERPRISE Description or Document Category October 06, 2016 Contents M.App Enterprise Server... 3 Hardware requirements... 3 Disk space requirements... 3 Production environment

More information

SAP HANA Operation Expert Summit BUILD User Management & Security Overview Andrea Kristen/SAP HANA Product Management May 2014.

SAP HANA Operation Expert Summit BUILD User Management & Security Overview Andrea Kristen/SAP HANA Product Management May 2014. SAP HANA Operation Expert Summit BUILD User Management & Security Overview Andrea Kristen/SAP HANA Product Management May 2014 Customer Disclaimer This presentation outlines our general product direction

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Qvidian Proposal Automation System Requirements

Qvidian Proposal Automation System Requirements Qvidian Proposal Automation System Requirements Version 11.0.6-10/13/2017 Copyright Copyright 2017 Qvidian. All rights reserved. Information in this document is subject to change without notice. The software

More information

SECTION SPECIAL SYSTEMS. Website and Construction Cameras

SECTION SPECIAL SYSTEMS. Website and Construction Cameras PART 1 GENERAL SECTION 01121 SPECIAL SYSTEMS 1.01 WORK INCLUDED A. Project Construction Site Cameras and Video Streaming Servers B. Project Web site C. Network & Infrastructure D. Internet Connectivity

More information

MyCloud Computing Business computing in the cloud, ready to go in minutes

MyCloud Computing Business computing in the cloud, ready to go in minutes MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Information Security BYOD Procedure

Information Security BYOD Procedure Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,

More information

April Appendix 3. IA System Security. Sida 1 (8)

April Appendix 3. IA System Security. Sida 1 (8) IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA

More information

1) Are employees required to sign an Acceptable Use Policy (AUP)?

1) Are employees required to sign an Acceptable Use Policy (AUP)? Business ebanking Risk Assessment & Controls Evaluation As a business owner, you want to be sure you have a strong process in place for monitoring and managing who has access to your Business ebanking

More information

FY19 ITS Service Rates

FY19 ITS Service Rates ITS Service Rates Standard Devices Rate Standard Devices New Connection, Replacement, Reconnect, Relocation FY18 Rate Standard Locked Desktop/Laptop $400 per year $100 one-time fee * $395 per year 1.27%

More information

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox. Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

BRING YOUR OWN DEVICE POLICY

BRING YOUR OWN DEVICE POLICY BRING YOUR OWN DEVICE POLICY Updated Term 2 Review 2019 17 Quorn Area School BYOD POLICY [Review of policy in 2019] Quorn Area School is committed to aiding students and staff in creating a 21st Century

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016

RFP # QUESTIONS AND ANSWERS Posted: February 5, 2016 RFP # 2016-02 QUESTIONS AND ANSWERS Posted: February 5, 2016 REQUEST FOR PROPOSAL RFP # 2016-02 Q: Who currently manages your IT services today? A: Inspired Technologies. Q: Are you satisfied with their

More information

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7.

TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION. VMware Horizon 7 version 7. TECHNICAL WHITE PAPER AUGUST 2017 REVIEWER S GUIDE FOR VIEW IN VMWARE HORIZON 7: INSTALLATION AND CONFIGURATION VMware Horizon 7 version 7.x Table of Contents Introduction.... 3 JMP Next-Generation Desktop

More information

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved. Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.

More information

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3

More information

Enterprise Architecture Technology Standards

Enterprise Architecture Technology Standards Platform Technical Requirements May 29, 2018 Enterprise Architecture Technology Standards Our Vision We will become the nation's model for delivery of technology, media, and contact center services for

More information

Government Price Sheet Respondent:

Government Price Sheet Respondent: Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either, Academic or both. Any software listed for which there is not a corresponding

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018

CUNY Graduate Center Information Technology. IT Provisioning for Business Continuity & Disaster Recovery Effective Date: April 6, 2018 CUNY Graduate Center Information Technology IT for & Effective Date: April 6, 2018 Introduction Organization Information Technology (IT) is the division of the Graduate Center responsible for voice, video

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Accelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions

Accelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions Accelerated Technology Refresh Project (ATRP) at VCH and PHC Frequently Asked Questions About the Desktop Transformation Program What is the Accelerated Technology Refresh Project? What are the costs to

More information

Unifia Environment UE

Unifia Environment UE Unifia Environment UE IT Specifications 2018 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 8 TR0091V07 Unifia Environment UE IT Specifications UE SERVER MINIMUM SPECIFICATIONS Operating System: Microsoft

More information

Information Technology Disaster Recovery Planning Audit Redacted Public Report

Information Technology Disaster Recovery Planning Audit Redacted Public Report 1200, Scotia Place, Tower 1 10060 Jasper Avenue Edmonton, Alberta T5J 3R8 edmonton.ca/auditor Information Technology Disaster Recovery Planning Audit Redacted Public Report June 12, 2018 City of Edmonton

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Introduction. Architecture Overview

Introduction. Architecture Overview Performance and Sizing Guide Version 17 November 2017 Contents Introduction... 5 Architecture Overview... 5 Performance and Scalability Considerations... 6 Vertical Scaling... 7 JVM Heap Sizes... 7 Hardware

More information

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai

More information

Perceptive Process Mining

Perceptive Process Mining Perceptive Process Mining Technical s Version: 2.13.x Written by: Product Knowledge, R&D Date: March 2018 2015-2018 Hyland Software, Inc. and its affiliates. Table of Contents About the technical specifications...

More information

Security Architecture

Security Architecture Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

Unifia Environment UE

Unifia Environment UE Unifia Environment UE IT Specifications 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 6 TR0091V06 Unifia Environment UE IT Specifications UE SERVER MINIMUM SPECIFICATIONS Operating System: Microsoft

More information

Academic Price Sheet Respondent:

Academic Price Sheet Respondent: Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either Government, or both. Any software listed for which there is not a corresponding

More information

Introduction to SURE

Introduction to SURE Introduction to SURE Contents 1. Introduction... 3 2. What is SURE?... 4 3. Aim and objectives of SURE... 4 4. Overview of the facility... 4 5. SURE operations and design... 5 5.1 Logging on and authentication...

More information

Morningstar ByAllAccounts Service Security & Privacy Overview

Morningstar ByAllAccounts Service Security & Privacy Overview Morningstar ByAllAccounts Service Security & Privacy Overview Version 3.8 April 2018 April 2018, Morningstar. All Rights Reserved. 10 State Street, Woburn, MA 01801-6820 USA Tel: +1.781.376.0801 Fax: +1.781.376.8040

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

IBM SmartCloud Notes Security

IBM SmartCloud Notes Security IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Phire 12.2 Hardware and Software Requirements

Phire 12.2 Hardware and Software Requirements Phire 12.2 Hardware and Software Requirements Copyright 2017, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are provided

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

Integrated Cloud Environment Security White Paper

Integrated Cloud Environment Security White Paper Integrated Cloud Environment Security White Paper 2012-2016 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n R i c o h A m e r i c a s C o r p o r a t i o n It is the reader's

More information

Getting Started with Commercial Services

Getting Started with Commercial Services Getting Started with Commercial Services USER GUIDE For informational purposes only, not considered an advertisement. WELCOME TO M&T BANK S COMMERCIAL SERVICES M&T Bank s Commercial Services system provides

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Security and Compliance at Mavenlink

Security and Compliance at Mavenlink Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Sage 200c Professional. System Requirements and Prerequisites

Sage 200c Professional. System Requirements and Prerequisites Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter

More information

Sage 200c Professional. System Requirements and Prerequisites

Sage 200c Professional. System Requirements and Prerequisites Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2017. All rights reserved. If this documentation includes advice or information relating to any matter

More information

P a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection

P a g e 1. Teknologisk Institut.   Online kursus k SysAdmin & DevOps Collection P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

Atmosphere Fax Network Architecture Whitepaper

Atmosphere Fax Network Architecture Whitepaper Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11

More information

MYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6

MYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6 Wednesday 21 st March 2012 Version 2.6 Contents 1 SYSTEM REQUIREMENTS... 4 1.1 OVERVIEW... 4 1.2 SERVER REQUIREMENTS... 4 1.2.1 SERVER REQUIREMENTS (EXCLUDING TERMINAL SERVER)... 4 1.2.2 WINDOWS TERMINAL

More information

Hosted Desktop Features & Benefits. Technology House, 59 Washway Road, Sale, Manchester, M33 7AB Support

Hosted Desktop Features & Benefits. Technology House, 59 Washway Road, Sale, Manchester, M33 7AB Support Hosted Desktop Features & Benefits Contents 3: Features 4: Data & Storage 5: Data Centres 6: Security 7: Support 8/9: FAQs Features Windows 10 Desktop 30GB Storage Office 2016/2019 Hosted Exchange 2016/2019

More information

CODE ALERT Enterprise Software Customer Information Technology Requirements

CODE ALERT Enterprise Software Customer Information Technology Requirements CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

AMP CREATIVES is a digital creative agency empowering small business growth via

AMP CREATIVES is a digital creative agency empowering small business growth via AMP CREATIVES is a digital creative agency empowering small business growth via identity through design. We believe that attention to craft, quality, and character embed life and beauty into every partnership

More information

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

General Recommendations

General Recommendations General Recommendations The following recommendations are not required for a successful implementation of PowerSchool, but are strongly recommended for reasons pertaining to data security, redundancy,

More information

Sage 200c Professional. System Requirements and Prerequisites

Sage 200c Professional. System Requirements and Prerequisites Sage 200c Professional System Requirements and Prerequisites Copyright statement Sage (UK) Limited, 2018. All rights reserved. If this documentation includes advice or information relating to any matter

More information

VMware App Volumes Installation Guide. VMware App Volumes 2.13

VMware App Volumes Installation Guide. VMware App Volumes 2.13 VMware App Volumes Installation Guide VMware App Volumes 2.13 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

PHILADELPHIA GAS WORKS

PHILADELPHIA GAS WORKS Q1 Q2 Q3 Q4 QUESTIONS Regarding section 2.2.1 Hosting Services. The last bullet on page 6 states Primary Data center facility to be located in Philadelphia. Does this just confirm that PGW already has

More information

Network Performance, Security and Reliability Assessment

Network Performance, Security and Reliability Assessment Network Performance, Security and Reliability Assessment Presented to: CLIENT NAME OMITTED Drafted by: Verteks Consulting, Inc. 2102 SW 20 th Place, Suite 602 Ocala, Fl 34474 352-401-0909 ASSESSMENT SCORECARD

More information

Service Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS

Service Catalog. Infrastructure and Compute. Virtual Machines. Cirrus Compute. Test/Dev. Private Cloud. WebLogic Database. Platform Jboss IIS Cirrus Offerings Service Catalog Infrastructure and Compute Test/Dev Virtual Machines Cirrus Compute Private Cloud Platform Jboss IIS WebLogic Database Storage Business Continuity and Availability File

More information

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012 Microsoft Solutions Summit 2012 1 Building Private Cloud with Microsoft Solution 2 Building Private Cloud with Microsoft Solution Atos integration Establish a new strategic IT partnership From July 2011

More information

ACM Retreat - Today s Topics:

ACM Retreat - Today s Topics: ACM Retreat - Today s Topics: Phase II Cyber Risk Management Services - What s next? Policy Development External Vulnerability Assessment Phishing Assessment Security Awareness Notification Third Party

More information

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016 Price list for Microsoft Office 365 from Swisscom Valid from 1 may, 2016 2 Overview General part 3 Plans Business (1 300 users) 4 > Office 365 Business > Office 365 Business Essentials > Office 365 Business

More information

Version v November 2015

Version v November 2015 Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise

More information